Hash Codes Icon

Hash Codes

A cryptographic hash function is a deterministic procedure

Hash CodesOverview

A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value. The data to be encoded is often called the "message", and the hash value is sometimes called the message digest or simply digest.

The ideal cryptographic hash function has four main properties:

it is easy to compute the hash value for any given message,
it is infeasible to find a message that has a given hash,
it is infeasible to modify a message without changing its hash,
it is infeasible to find two different messages with the same hash.
Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (Macs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to Detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information security contexts, cryptographic hash values are sometimes called (digital) Fingerprints, checksums, hash codes, hash sums, hash values, or simply hashes, even though all these terms stand for functions with rather different properties and purposes.

Want to be sure that your data has not been altered or damaged, earlier generate a hash code for them and at the right time (after copying) compare to find out they are identical.

Features:
Hash data from keyboard, file or CD/DVD
Uses Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 and Whirlpool Algorithm
Copy hash codes to clipboard or save to disk
Can compare hash codes
Load saved hash code file to comparison
Progress bar show the current process
Suspend, resume or stop the hash process
Save log information

NEW

Fixed some bugs.

Hash CodesInformation

Version
1.56.270.8500
Date
07.13.10
License
Free
Language
English
File Size
655KB
Category
SubCategory
Operating Systems
Windows 7, Vista, 2003, XP
System Requirements
No additional system requirements.
Hotspot Shield Icon
Safely access blocked and banned sites outside of your region.
Free
Planet VPN Icon
FREE VPN - FAST AND SECURE
Free
Portable SecureCRT Icon
SecureCRT gives you an encrypted Secure Shell (SSH1 and SSH2) session
StegDetect Icon
detect steganographic content in images
Free
X509 Certificate Generator Icon
The X509 Certificate Generator is a multi purpose certificate utility.
HandyBits EasyCrypto Deluxe Icon
The easiest and most reliable way to secure your data with strong encryption
Trial
Vpn One Click Icon
Keep your privacy surfing the web, unblock all blocked services and stay safe from the "Big Data".
Demo
Cisdem AppCrypt Icon
Password protect apps and block websites on Windows to improve productivity.
Trial
More